GitHub - stevelr/age-op: simple CLI encryption without the footguns: age + 1password
Skip to content
/ age-op Public

simple CLI encryption without the footguns: age + 1password

License

Apache-2.0, MIT licenses found

Licenses found

Apache-2.0
LICENSE-apache
MIT
LICENSE-mit
Notifications You must be signed in to change notification settings

stevelr/age-op

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Simple CLI encryption without the footguns

This age-op bash script combines the awesome age cli for encryption and decryption, with 1password for secure key storage. It can also create age-compatible ed25519 keys and store them in a 1password vault. Through the magic of 1password-host integration, it takes advantage of the various conveniences for unlocking the vault: biometrics, touch-id, apple watch (macos), yubi key, etc.

Examples below show encryption and decryption of files and streams (stdin/stdout). Scripts and documentation are provided showing how to use age-op on remote servers, CI pipelines, and edge devices.

Dependencies:

Usage Examples

For help and examples,

age-op [ -h | --help ]

Encrypt

Encrypt a file

age-op -e -k KEY_PATH [ -o OUTPUT ] [ -t TMPDIR ] [ FILE ]

Encrypt multiple files and folders.

tar czf - FILE_OR_DIR [ FILE_OR_DIR ... ] | age-op -e -k KEY_PATH -o foo.tar.gz.age

Encrypt database backup

pg_dump | age-op -e -k KEY_PATH -o db-snapshot-$(date '+%Y%m%d-%H%M%S').age 

Decrypt

Decrypt a file

age-op -d -k KEY_PATH [ -o OUTPUT ] [-t TMPDIR ] [ FILE ]

Decrypt files and folders.

age-op -d -k KEY_PATH foo.tar.gz.age | tar xzf -

Generate a key

Generate an age identity key and store it in the 1password vault. The type of the new item will be "Password", and the key is stored in the field named password.

age-op -n -k KEY_PATH

Options

description
-k KEY_PATH (required) path to key in a 1Password vault, in one of the following formats:
op://vault/title
op://vault/title/field
op://vault/title/section/field
The first variant can be used when the field name is password.
-o OUTPUT path to output file. If - or if not specified, stdout is used
-t TMPDIR TMPDIR is a private folder where keys are briefly stored so they can be read by age, then quickly removed.
On linux, the default is /run/user/USERID. On macos, the default is $TMPDIR. Both of these folders are usually owned by current user with mode 700.
FILE path to input file. If - or if not specified, stdin is used.

1Password access: local and remote

The 1Password cli op, used inside age-op, can access a 1Password vault in one of three ways - through a locally installed desktop app, as a service account, or via a 1Password Connect Server. The latter two methods don't require a local app, and are especially useful for headless servers, CI pipelines, and edge devices.

Local connection to desktop app

The op cli should automatically connect to a locally installed app. In some cases, you may need to run eval $(op signin) to authenticate the current shell.

Service Account

For service account authentication, op uses a token from the environment variable OP_SERVICE_ACCOUNT_TOKEN . The service account is configured from the 1Password web UI, where you generate and download tokens.

Although a service account token provides limited access - access is limited to specific approved vaults, and only until the token expiration date - it's still a secret that needs some protection. For a CI pipeline, or in AWS or K8s where you can inject environment variables, it's straightforward to add the token to the environment of the remote process. If you are connecting to the server via ssh from a trusted host (e.g., your workstation or laptop), you can pass the environment variable as part of the ssh session, either with the ssh command

ssh -o SendEnv=OP_SERVICE_ACCOUNT_TOKEN ...

or by adding SendEnv or SetEnv to the ssh client configuration (~/.ssh/config)

Host some-remote
    # Pass the token from my env
    SendEnv OP_SERVICE_ACCOUNT_TOKEN
    # or, send the value from this config file
    SetEnv OP_SERVICE_ACCOUNT_TOKEN=<TOKEN<>

On the remote host, you'll probably need to add a line to /etc/ssh/sshd_config to tell the ssh server to accept the environment variable.

AcceptEnv OP_SERVICE_ACCOUNT_TOKEN

1Password Connect Server

A 1Password Connect Server is another method op can use to access a vault. Instead of connecting to the 1Password cloud, it connects to a server that you run on your own infrastructure.

This method has the additional overhead of starting a server, but there is some additional flexibility. See op-connect in this repository for a docker-compose file, scripts, and additional instructions.

I use this in cases when I ssh from a desktop or laptop that has 1password installed, and I want to use different encryption keys and access policies for different remote hosts. The connect server runs for the duration of the ssh session, handling callbacks from the remote apps. The credentials are short-lived (only as long as the ssh session), fine-tuned to the target, and no keys or tokens are left behind on the remote servers.

Alternatives

Some of the popular alternatives to age I considered.

  • openssl cli. Although often recommended in blogs and SO, it has significant flaws and footguns

  • gnupg (gpg) has so many options it's easy to make poor choices, and is far from the ideal "secure by default".

  • 7zip (7z) uses aes-256, but doesn't retain unix ownership and permissions, so isn't good for archive backups.

  • aescrypt - hard to review since the git repo is out of date, even though that's still linked from aescrypt dot com.

  • aws encryption cli - requires AWS KMS, and I wanted 1Password

  • veracrypt, rclone, and restic: All three of these are well-regarded, and I use them for other use cases, but they are too heavyweight (IMO) for a simple cli for encrypting stdin or a file at a time.

  • Writing yet-another tool. Not worth writing another binary.

age is broadly used, was written by a smart and thoughtful author, and stands on the shoulders of chacha20-poly1305 (RFC7539), x25519 (RFC 7748), HKDF-SHA-256 (RFC 5869). The short age-op script is easy to review, and doesn't introduce any new encryption algorithms or do anything fancy. All files created or read by age-op are 100% compatible with age and rage, so there is no lock-in or risk of incompatibility.

Future

There may be reasons for building this as an age plugin, or for taking advantage of future plugins.

About

simple CLI encryption without the footguns: age + 1password

Topics

Resources

License

Apache-2.0, MIT licenses found

Licenses found

Apache-2.0
LICENSE-apache
MIT
LICENSE-mit

Stars

Watchers

Forks

Languages